We examine the effectiveness of rule learning to detect intrusions against privileged programs, using a feature vector representation to describe the system calls executed by each process. We then use the genetic algorithm approach to feature subset selection to show that we can reduce the number of features observed while maintaining or improving learning accuracy. Therefore, the amount of data that must be obtained from running processes is reduced. This application of artificial intelligence is used in one component of our intrusion detection system, which implements a system on which data mining can be performed to provide global, temporal views of intrusions on a distributed system
This thesis presents the case of dynamically and adaptively learning signatures for network intrusio...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Machine Learning techniques such as Genetic Algorithms and Decision Trees have been applied to the f...
This paper details an essential component of a multi-agent distributed knowledge network system for ...
We show the use of a genetic algorithm for feature subset selection over feature vectors that descri...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
An Intrusion detection system’s main aim is to identify the normal and intrusive activities. The obj...
The objective of this work is to explore the intrusion detection prob- lem and create simple rules f...
Many computational intelligence techniques for anomaly based network intrusion detection can be foun...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
Abstract—Intrusion detection system is used to identify anomalous packets in network. It can also id...
Abstract. An ever-present problem in intrusion detection technology is how to construct the patterns...
In recent years, network based services and network based attacks have grown significantly. The netw...
With the rapid expansion of computer networks during the past decade, security has become a crucial ...
This thesis presents the case of dynamically and adaptively learning signatures for network intrusio...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Machine Learning techniques such as Genetic Algorithms and Decision Trees have been applied to the f...
This paper details an essential component of a multi-agent distributed knowledge network system for ...
We show the use of a genetic algorithm for feature subset selection over feature vectors that descri...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
An Intrusion detection system’s main aim is to identify the normal and intrusive activities. The obj...
The objective of this work is to explore the intrusion detection prob- lem and create simple rules f...
Many computational intelligence techniques for anomaly based network intrusion detection can be foun...
Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Int...
Abstract—Intrusion detection system is used to identify anomalous packets in network. It can also id...
Abstract. An ever-present problem in intrusion detection technology is how to construct the patterns...
In recent years, network based services and network based attacks have grown significantly. The netw...
With the rapid expansion of computer networks during the past decade, security has become a crucial ...
This thesis presents the case of dynamically and adaptively learning signatures for network intrusio...
Intrusion Detection System (IDS) is one of the key security components in today’s networking environ...
Machine Learning techniques such as Genetic Algorithms and Decision Trees have been applied to the f...